Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powerful ways for gaining information about the secret key as well as various count...
Francesco Regazzoni, Thomas Eisenbarth, Luca Breve...
Abstract. Most of the approaches dedicated to fiber tracking from diffusionweighted MR data rely on a tensor model. However, the tensor model can only resolve a single fiber orient...
In this paper, we describe a real-time algorithm for computing the ego-motion of a vehicle relative to the road. The algorithm uses as input only those images provided by a single ...
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
We are developing a complex computer aided diagnosis (CAD) system to detect small pulmonary nodules from helical CT scans. Here we present a classifier to reduce the number of fal...
Martin Dolejsi, Jan Kybic, Stanislav Tuma, Michal ...